Recent Breaches Raise Concern About Healthcare Cybersecurity

Hardly a week passes by these days without news of another breach in the healthcare industry. Companies in this sector have been hit especially hard with “mega-breaches,” incidents that expose thousands to millions of records in one attack. This news highlights the clear vulnerabilities in this sector and the desperate need for healthcare providers to better protect their patients’ data.   Recent Healthcare Cybersecurity News In recent weeks, two major breaches have come to light that exposed names, social security numbers and more crucial information. Rush System for Health notified 45,000 patients last week that their data may have been compromised in an attack discovered on January 22nd, according to…

Eliminate the Stress of Disaster Recovery with Off-Site Backup

Off-site backup options have proven to be successful among businesses when it comes to disaster recovery. Disaster recovery is the use of tools and outlined procedures that initiate the recovery of an organization’s technology infrastructure. This typically occurs after an error disables the system or a human-induced attack is implemented on a system. By using off-site backup systems, organizations can eliminate the stress of disaster recovery.   Reliability An off-site backup system is completely automated, which means that information is updated daily. Since these backups occur via the Internet, files can be stored and retrieved from multiple locations, according to Claremont Patch. If an IT disaster were to occur, important…

Why Business Size Doesn’t Matter When It Comes to Cyber Attacks

Large organizations used to be the main targets hackers due to the massive volumes of sensitive financial and customer data they possessed. As cyber attacks become more advanced, attackers are starting to feed into the valuable data that’s held by smaller businesses. A recent Cyber Security Breaches Survey, conducted by the U.S. Department for Culture Media & Sport, reported that 45 percent of micro/small companies have experienced a breach in their system and 66 percent of medium/large businesses have suffered attacks as well. This information warns small business leaders to be prepared against a breach and to protect their customer’s data. Public awareness of cyber attacks has helped the battle…

Why Your Business Needs 24/7 Network Monitoring

  Network monitoring is crucial for every business, no matter the industry. In fact, 24/7 network monitoring ensures your computer network is always up and running by checking for slow or failing systems. If any issues arise, the system will alert the network administrator. This constant monitoring can help save money, time and potentially catastrophic data loss. Here are some of the reasons why every business needs 24/7 network monitoring: Security One of the main benefits of 24/7 network monitoring is ensuring that your files and data are secure. Any issues in the network will be detected beforehand. Network monitoring is perhaps the most proactive way to deal with problems…

Why Companies Should Conduct a Monthly Cybersecurity Audit

Cybercrime damage costs are set to hit six trillion dollars by 2021. Last year, made headlines with the largest ransomware attack in history, WannaCry. Needless to say, cybercrime is on the rise and organizations need to be prepared. Organizations that leave their companies vulnerable to cyber attacks risk losing business and crucial data. A monthly cybersecurity audit helps businesses prevent being victims of cybercrime. Here are some steps that should be included in a cybersecurity audit:   Check that all software is up to date. Regardless of the size of your organization, it’s critical that employee devices are operating on the most current software. Outdated software is a common culprit…

Free and Open Source Software Month is a Reminder of the Need for Cybersecurity

  February is Free and Open Source Software month (FOSS). If you’ve ever used Mozilla Firefox web browser, Thunderbird email, PHP scripting, or Apache web server, then you’ve used open source programs. Open source software (OSS) is distributed with its source code available for modification by anyone, turning software development into a collaborative process. Open source has become a bit of a buzzword in recent years, with opinions falling strongly in both the pro and con categories. Supporters tout OSS as an innovative concept that essentially crowd-sources software development for rapid evolution, bug identification and repair, readily available community support, and complete customization. Another boon, of course, is that it’s…

Olympic Games Hit with Cyberattack

  Olympic officials and cybersecurity experts are attributing Internet disruptions during last week’s Olympic opening ceremony were the result of a cyberattack. Jihye Lee, a spokesman for the PyeongChang Organizing Committee, confirmed the news Sunday, saying, “The technology issues experienced Friday night were caused by a cyberattack.”   The first signs of trouble arose when the website and internal systems of the winter games were taken offline during the opening ceremony in PyeongChang on Friday, after hackers detonated their probes inside the network, according to Sky News. News outlets had issues reporting on the event because the hackers knocked out the WiFi. Analysis by researchers at the cybersecurity intelligence wing…

Municipal Organizations Need Cybersecurity

  Municipal entities are responsible for storing personal records of citizens. Birth certificates, mortgage documents, medical records and Social Security numbers are just some of the sensitive data they collect and store. Citizens rely on municipal organizations to keep their data private and protected, which cannot be accomplished without a proper cybersecurity program.   According to CIO, the vast majority of public agencies lack a clear cybersecurity plan. This is troubling when you think about the amount of personal data hackers could steal. There are several factors that cause a lack of sufficient cybersecurity programs in municipal organizations. Here are a few:   Lack of training. Employees of municipal organizations…

Cybersecurity Tips for Healthcare Organizations

  When you go to a doctor or medical professional, you expect your information to be kept private. That’s because it’s the responsibility of medical organizations to keep your health records confidential. This expectation can be complicated in today’s digital world, especially when healthcare providers face numerous cybersecurity threats from ransomware and other cyber attacks. A recent study found that 72 percent of all healthcare malware attacks in 2016 were ransomware. Healthcare organizations need to have reliable cybersecurity to protect sensitive information. Read on as we detail some savvy cybersecurity tips for healthcare organizations in 2018.   Update cybersecurity procedures and protocols. Employees need to be trained on procedures to…

Cybersecurity Tips for Accounting Firms in 2018

  It’s hardly a revelation that accountants and accounting firms hold sensitive information about their clients. From social security numbers to addresses, hackers are constantly seeking to obtain sensitive data, a task that can be alarmingly easy if firms don’t have proper cybersecurity measures in place. That’s why accountants need to be motivated now more than ever vigilant about protecting their client data. In fact, a recent study showed that in the last year 500 million financial records have been stolen in data breaches and other hacks.   Small accounting firms may think they can be protected by the veil of obscurity, but hackers  often aim for small firms precisely…